instruction stringclasses 4
values | input stringlengths 47 5.51k | output stringclasses 833
values |
|---|---|---|
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Blackfly
### Target Entity: ForkPlayground
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
Current Blackfly toolset
The following tools were used in attacks during late 2022 and early 2023:
* **Backdoor.Winnkit**
SHA256: caba1085791d13172b1bb5aca256160103... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Blackfly
### Target Entity: Winnkit
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
Current Blackfly toolset
The following tools were used in attacks during late 2022 and early 2023:
* **Backdoor.Winnkit**
SHA256: caba1085791d13172b1bb5aca25616010349ecce1... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Blackfly
### Target Entity: Proxy configuration tool
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
Current Blackfly toolset
The following tools were used in attacks during late 2022 and early 2023:
* **Backdoor.Winnkit**
SHA256: caba1085791d13172b1bb5ac... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Blackfly
### Target Entity: Screenshotting tool
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
Current Blackfly toolset
The following tools were used in attacks during late 2022 and early 2023:
* **Backdoor.Winnkit**
SHA256: caba1085791d13172b1bb5aca2561... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Blackfly
### Target Entity: Process-hollowing tool
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
Current Blackfly toolset
The following tools were used in attacks during late 2022 and early 2023:
* **Backdoor.Winnkit**
SHA256: caba1085791d13172b1bb5aca2... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Blackfly
### Target Entity: SQL tool
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
Current Blackfly toolset
The following tools were used in attacks during late 2022 and early 2023:
* **Backdoor.Winnkit**
SHA256: caba1085791d13172b1bb5aca25616010349ecce... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
MSIL.REDCAP.AD
### Target Entity: APT34
### Possible Relationship Labels:
[]
### Text Passage:
On December 2022, we identified a suspicious executable (detected by Trend Micro as Trojan.MSIL.REDCAP.AD) that was dropped and executed on multiple machines. Our investigation led us to link this attack to... | <label>authored-by</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
DevicesSrv.exe
### Target Entity: MSIL.REDCAP.A
### Possible Relationship Labels:
['indicates', 'is not related to', 'not sure']
### Text Passage:
Routine
In this section, we describe the attack infection flow and its respective stages, as well as share details on how the group uses emails to steal a... | <label>indicates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
MSIL.REDCAP.A
### Target Entity: Microsoft Exchange
### Possible Relationship Labels:
['downloads', 'drops', 'uses', 'is not related to', 'not sure']
### Text Passage:
Routine
In this section, we describe the attack infection flow and its respective stages, as well as share details on how the group u... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Microsoft.Exchange.WebServices.dll
### Target Entity: MrPerfectInstaller
### Possible Relationship Labels:
[]
### Text Passage:
Routine
In this section, we describe the attack infection flow and its respective stages, as well as share details on how the group uses emails to steal and exfiltrate criti... | <label>indicates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
MrPerfectInstaller
### Target Entity: .Net
### Possible Relationship Labels:
[]
### Text Passage:
Routine
In this section, we describe the attack infection flow and its respective stages, as well as share details on how the group uses emails to steal and exfiltrate critical information.
**First Stage... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
MSIL.REDCAP.A
### Target Entity: Microsoft Exchange
### Possible Relationship Labels:
['downloads', 'drops', 'uses', 'is not related to', 'not sure']
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) ... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
MSIL.REDCAP.A
### Target Entity: EWS
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on t... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Middle East
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid d... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: China
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain ... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Jordan
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Saudi Arabia
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid ... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Qatar
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the ... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Oman
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the E... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Kuwait
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Bahrain
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to th... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Lebanon
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to th... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Egypt
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the ... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Saitama
### Target Entity: Microsoft Exchange
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Karkoff
### Target Entity: EWS
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the ... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Saitama
### Target Entity: EWS
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the ... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Saitama
### Target Entity: .Net
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: United Arab Emirates
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: China
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain ... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Saudi Arabia
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid ... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Qatar
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the ... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Oman
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the E... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Kuwait
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Bahrain
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to th... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Lebanon
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to th... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Egypt
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the ... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: C&C
### Possible Relationship Labels:
['uses', 'hosts', 'owns', 'compromises', 'is not related to', 'not sure']
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the ... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Saitama
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to th... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Karkoff
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to th... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: .Net
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the E... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: .Net backdoor
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Microsoft Exchange
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain cred... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Excel
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: EWS
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log on to the Ex... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Saitama
### Target Entity: .Net backdoor
### Possible Relationship Labels:
[]
### Text Passage:
**Data Exfiltration Through Legitimate Mail Traffic**
The main backdoor function (detected by Trend Micro as Backdoor.MSIL.REDCAP.A) receives the valid domain credentials as an argument and uses it to log ... | <label>variant-of</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
DevicesSrv.exe
### Target Entity: MSIL.REDCAP.A
### Possible Relationship Labels:
['indicates', 'is not related to', 'not sure']
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targe... | <label>indicates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
MSIL.REDCAP.A
### Target Entity: EWS
### Possible Relationship Labels:
[]
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus ... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Middle East
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targ... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Karkoff
### Target Entity: EWS
### Possible Relationship Labels:
[]
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on com... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Saitama
### Target Entity: EWS
### Possible Relationship Labels:
[]
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on com... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Saitama
### Target Entity: .Net
### Possible Relationship Labels:
[]
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on co... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
1f47770cc42ac8805060004f203a5f537b7473a36ff41eabb746900b2fa24cc8
### Target Entity: Karkoff
### Possible Relationship Labels:
[]
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targe... | <label>indicates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
827366355c6429a7fe12d111e240c5bcec3ed61e717fb84ea8b771672dd1f88e
### Target Entity: Win64.REDCAP.AF
### Possible Relationship Labels:
['indicates', 'is not related to', 'not sure']
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this ... | <label>indicates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
5ed7ebc339af6ca6a5d1b9b45db6b3ae00232d9ccd80d5fcadf7680320bd4e6b
### Target Entity: MSIL.REDCAP.A
### Possible Relationship Labels:
['indicates', 'is not related to', 'not sure']
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this at... | <label>indicates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Saitama
### Possible Relationship Labels:
[]
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on c... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: Karkoff
### Possible Relationship Labels:
[]
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on c... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: .Net
### Possible Relationship Labels:
[]
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on comp... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
psgfilter.dll
### Target Entity: Win64.REDCAP.AF
### Possible Relationship Labels:
['indicates', 'is not related to', 'not sure']
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targ... | <label>indicates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: .Net backdoor
### Possible Relationship Labels:
[]
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focu... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
APT34
### Target Entity: EWS
### Possible Relationship Labels:
[]
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special focus on compr... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Saitama
### Target Entity: .Net backdoor
### Possible Relationship Labels:
[]
### Text Passage:
Attribution Analysis
There are several data points and indicators that suggest APT34 carried out this attack, and that this group is still active in targeting countries in the Middle East with a special fo... | <label>variant-of</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
powershell.exe
### Target Entity: PowerShell
### Possible Relationship Labels:
['indicates', 'is not related to', 'not sure']
### Text Passage:
### **CHM Files**
The more common payloads contained within the RAR files are Microsoft Compiled HTML Help (CHM) files. These can be used to simply execute a... | <label>indicates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: United Front Work Department
### Possible Relationship Labels:
['targets', 'impersonates', 'attributed-to', 'is not related to', 'not sure']
### Text Passage:
### **CHM Files**
The more common payloads contained within the RAR files are Microsoft Compiled HTML Help (CHM)... | <label>impersonates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Excel
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
### **CHM Files**
The more common payloads contained within the RAR files are Microsoft Compiled HTML Help (CHM) files. These can be used to simply execute arbitrary code,... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: PowerShell
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
### **CHM Files**
The more common payloads contained within the RAR files are Microsoft Compiled HTML Help (CHM) files. These can be used to simply execute arbitrary ... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Microsoft Office
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
### **CHM Files**
The more common payloads contained within the RAR files are Microsoft Compiled HTML Help (CHM) files. These can be used to simply execute arbi... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: United Front Work Department
### Possible Relationship Labels:
['targets', 'impersonates', 'attributed-to', 'is not related to', 'not sure']
### Text Passage:
### **CHM Files**
The more common payloads contained within the RAR files are Microsoft Compiled HTML Help (CHM)... | <label>impersonates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: C2
### Possible Relationship Labels:
['uses', 'hosts', 'owns', 'compromises', 'is not related to', 'not sure']
### Text Passage:
### **CHM Files**
The more common payloads contained within the RAR files are Microsoft Compiled HTML Help (CHM) files. These can be used to s... | <label>owns</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
PowerShell
### Target Entity: Windows
### Possible Relationship Labels:
['targets', 'uses', 'is not related to', 'not sure']
### Text Passage:
### **CHM Files**
The more common payloads contained within the RAR files are Microsoft Compiled HTML Help (CHM) files. These can be used to simply execute ar... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Excel
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
### **Malicious Microsoft Excel** Files
The Excel payloads simply contain an Equation Editor exploit that creates two different scheduled tasks. There is no decoy in the d... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Equation Editor
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
### **Malicious Microsoft Excel** Files
The Excel payloads simply contain an Equation Editor exploit that creates two different scheduled tasks. There is no deco... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: China
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
Analysis of Phishing Lures and Payloads
We identified seven emails pretending to be from the Embassy of Kyrgyzstan, being sent to recipients in the nuclea... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Ministry of Foreign Affairs
### Possible Relationship Labels:
['targets', 'impersonates', 'attributed-to', 'is not related to', 'not sure']
### Text Passage:
Analysis of Phishing Lures and Payloads
We identified seven emails pretending to be from the Embassy of Kyrgyzsta... | <label>impersonates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: IAEA
### Possible Relationship Labels:
['targets', 'impersonates', 'attributed-to', 'is not related to', 'not sure']
### Text Passage:
Analysis of Phishing Lures and Payloads
We identified seven emails pretending to be from the Embassy of Kyrgyzstan, being sent to recipi... | <label>impersonates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: CIIS
### Possible Relationship Labels:
['targets', 'impersonates', 'attributed-to', 'is not related to', 'not sure']
### Text Passage:
Analysis of Phishing Lures and Payloads
We identified seven emails pretending to be from the Embassy of Kyrgyzstan, being sent to recipi... | <label>impersonates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Excel
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
Analysis of Phishing Lures and Payloads
We identified seven emails pretending to be from the Embassy of Kyrgyzstan, being sent to recipients in the nuclear energy industry... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Kyrgyzstan
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
Analysis of Phishing Lures and Payloads
We identified seven emails pretending to be from the Embassy of Kyrgyzstan, being sent to recipients in the n... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Embassy of Kyrgyzstan
### Possible Relationship Labels:
['targets', 'impersonates', 'attributed-to', 'is not related to', 'not sure']
### Text Passage:
Analysis of Phishing Lures and Payloads
We identified seven emails pretending to be from the Embassy of Kyrgyzstan, bei... | <label>impersonates</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Msiexec
### Target Entity: C2
### Possible Relationship Labels:
['targets', 'uses', 'is not related to', 'not sure']
### Text Passage:
Mitre ATT&CK
<table><tbody><tr><td><strong>Tactic</strong></td><td><strong>Technique</strong></td><td><strong>ID</strong></td><td><strong>Description</strong></td></t... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Asia-Pacific
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
Conclusion
Bitter APT have been conducting espionage campaigns for years using many tactics, including phishing, to achieve their goals. It is advi... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Asia-Pacific
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
Phishing Campaign Targets Chinese Nuclear Energy Industry
Intezer has been tracking activity targeting the energy sector and noted a campaign with ... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Pakistan
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
Phishing Campaign Targets Chinese Nuclear Energy Industry
Intezer has been tracking activity targeting the energy sector and noted a campaign with tech... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: China
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
Phishing Campaign Targets Chinese Nuclear Energy Industry
Intezer has been tracking activity targeting the energy sector and noted a campaign with techniq... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Bangladesh
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
Phishing Campaign Targets Chinese Nuclear Energy Industry
Intezer has been tracking activity targeting the energy sector and noted a campaign with te... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Saudi Arabia
### Possible Relationship Labels:
['targets', 'located-at', 'is not related to', 'not sure']
### Text Passage:
Phishing Campaign Targets Chinese Nuclear Energy Industry
Intezer has been tracking activity targeting the energy sector and noted a campaign with ... | <label>targets</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Excel
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
Phishing Campaign Targets Chinese Nuclear Energy Industry
Intezer has been tracking activity targeting the energy sector and noted a campaign with techniques that align wi... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Microsoft Office
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
Phishing Campaign Targets Chinese Nuclear Energy Industry
Intezer has been tracking activity targeting the energy sector and noted a campaign with techniques th... | <label>uses</label> |
You are a helpful threat intelligence analyst. Your task is to identify the label of the relationship between the source entity and the target entity in the provided text passage. To help you, we provide all the possible relationship labels between the source and target entities.
Answer in the following format: <label>... | ### Source Entity:
Bitter APT
### Target Entity: Windows Installer
### Possible Relationship Labels:
['uses', 'is not related to', 'not sure']
### Text Passage:
Phishing Campaign Targets Chinese Nuclear Energy Industry
Intezer has been tracking activity targeting the energy sector and noted a campaign with techniques t... | <label>uses</label> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.